Skip to content

  1. About us
  2. Our people
  3. Staff profiles
  4. Dr Jims Ningshen Marchang

Dr Jims Ningshen Marchang

Lecturer (Course Leader of Cybersecurity)

Summary

I completed my PhD from the CSCAN Research Laboratory, Plymouth University, UK.

I completed his Bachelor of Technology and Master of Technology with distinctions in Computer Science and Engineering, India.

I am the Course Leader of Cybersecurity, Department of Computing. I am a member of IEEE, member of IEEE young professionals, member of IEEE IoT community and a Fellow of Higher Education Academy, UK.

  • About

    I have teaching experience of 10 years in Networks, Network Socket Programming, Data Communication and Security.

    As a researcher, I publish works in leading journals and conferences (IEEE, Elsevier, Springer, HTE etc) in the fields of Ad Hoc and Sensor Networks, Autonomous Vehicles, IoT security, Blockchain and Information Security.

    I received the best paper award in 15th International Conference on Advance Computing and Communication, IEEE conferences, 2007. I am a reviewer of ETRI Journal, IEEE Transactions on Vehicular Technology, IEEE TVT Journal, Elsevier, Journal of Information Security and Applications, International Journal of Electrical and Computer Engineering (IJECE) and other leading IEEE conferences.

    I am a technical member of various conferences including INC, CIIT, ICACNI etc. I also collaborate with various industries and other universities for research activities and actively take part in reviewing books and have written a book called Optimising Application Performance in Ad Hoc Networks: A Research Perspective, Lambert Academic publishing, Germany and contributed chapters for a book called Penetration Testing: A Manager’s Guide, BCS.

    Specialist areas of interest

    QoS and Security aspects in Ad Hoc Networks (MANET, VANET, Sensor Networks)
    IoT (Smart Cities)
    Safety and Security in Autonomous Vehicles
    Intrusion Detection Systems
    SDN and Bid Data

  • Teaching

    Department of Computing

    Science, Technology and Arts

    Department of Computing
    Science, Technology and Arts
    Cybersecurity

    Courses

    Cybersecurity

    Modules

    Cybersecurity
    Modules
    Networking Fundamentals
    Secure Networking Technologies
    Wireless LAN Technologies
    Network Intrusion Detection
    Mobile Security
    Cloud Technologies

  • Research

    • Communication and Computing Research Centre

    Communication and Computing Research Centre

    Research interest

    QoS and Security in Ad Hoc Networks (MANET, VANET, Sensor Networks),
    IoT security, Blockchain Technology, Safety and Security in Autonomous Vehicle Communication, and Intrusion Detection Systems.

  • Publications

    Journal articles

    Marchang, J., Douglas, R., Ghita, B., Lancaster, D., & Sanders, B. (2018). Dynamic neighbour aware power-controlled MAC for multi-hop ad hoc networks. Ad hoc Networks, 75-76, 119-134. http://doi.org/10.1016/j.adhoc.2018.04.003

    Marchang, J., Ghita, B., & Lancaster, D. (2017). Location based transmission using a neighbour aware with optimized EIFS MAC for ad hoc networks. Ad Hoc Networks, 63, 62-78. http://doi.org/10.1016/j.adhoc.2017.06.001

    Marchang, J., Ghita, B., & Lancaster, D. (2015). Dynamic queue utilization based MAC for multi-hop ad hoc networks. Infocommunications Journal, 7 (3), 25-32. http://www.infocommunications.hu/documents/169298/1598142/InfocomJ_2015_3_5_Marchang.pdf

    Conference papers

    Marchang, J., Ibbotson, G., & Wheway, P. (2019). Will Blockchain technology become a reality insensor networks? 2019 Wireless Days (WD). http://doi.org/10.1109/WD.2019.8734268

    Marchang, J., Beavers, J., & Faulks, M. (2019). Hacking NHS Pacemakers: A Feasibility Study. 12th International Conference on Global Security, Safety & Sustainability. http://london.northumbria.ac.uk/event/icgs3-19/

    Marchang, J., Sanders, B., & Joy, D. (2018). Adaptive V2V routing with RSUs and gateway support to enhance network performance in VANET. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10866, 298-310. http://doi.org/10.1007/978-3-030-02931-9_24

    Sanders, B., & Marchang, J. (2016). A novel taxonomy of opportunities and risks in massively multiplayer online role playing games. In Proceedings of the International ACM conference on management of Digital Ecosystems, (pp. 90-98). ACM Digital Library: http://doi.org/10.1145/3012071.3012094

    Marchang, J., Ghita, B., & Lancaster, D. (2016). Location based transmission using a neighbour aware-cross layer MAC for ad hoc networks. In Mamatas, L., Matta, I., Papadimitriou, P., & Yevgeni, K. (Eds.) WWIC 2016: Wired/Wireless Internet Communications, (pp. 15-27). Cham: Springer: http://doi.org/10.1007/978-3-319-33936-8_2

    Marchang, J., Ghita, B., & Lancaster, D. (2015). Queue utilization with hop based enhanced arbitrary inter frame spacing MAC for saturated ad HOC networks. Proceedings of the 2015 14th Annual Mediterranean Ad Hoc Networking Workshop, MED-HOC-NET 2015. http://doi.org/10.1109/MedHocNet.2015.7173170

    Marchang, J., Ghita, B., & Lancaster, D. (2015). Dynamic Queue Utilization Based MAC for multi-hop Ad Hoc networks. Infocommunications Journal, 7 (3), 25-32.

    Marchang, J., Ghita, B., & Lancaster, D. (2013). Hop-Based dynamic fair scheduler for wireless Ad-Hoc networks. 2013 IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2013. http://doi.org/10.1109/ANTS.2013.6802873

    Kothari, S., Parmar, H., Das, E., Panda, N., Ahmed, A., & Marchang, J. (2011). HOST BASED INTRUSION DETECTION SYSTEM. 2011 INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING AND TECHNOLOGY (ICMET 2011), 875-878.

    Kothari, S., Parmar, H., Das, E., Panda, N., Ahmed, A., & Marchang, J. (2010). Host Based Intrusion Detection System. 2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL III, 336-339.

    Marchang, J., Nandi, S., & Sarma, N. (2010). Prioritized quality of service support medium access control for real time flows. 2nd International Conference on Computer and Network Technology, ICCNT 2010, 298-302. http://doi.org/10.1109/ICCNT.2010.69

    Marchang, J., S, S., Kumar, C., Islam, A., & N, S. (2008). Multi-Path Routing for Real Time Traffic with QoS Support.

    Jims, M., Sarma, N., & Nandi, S. (2007). Priority Based Fairness Provisioning QoS-Aware MAC Protocol. 15th International Conference on Advanced Computing and Communications (ADCOM 2007). http://doi.org/10.1109/adcom.2007.98

    Book chapters

    Marchang, J., & Douglas, R. (2019). SCOPING A PENETRATION TEST. In Penetration Testing A Guide for Business and IT Management. BCS, The Chartered Institute for IT

    Marchang, J., & Douglas, R. (2019). SELECTING TOOLS FOR PENETRATION TESTING. In Penetration Testing A Guide for Business and IT Management. BCS, The Chartered Institute for IT

    Marchang, J., & Nandi, S. (2011). Need for cross layer in wireless multi hop ad-hoc networks. In Advanced Computing Applications, Databases and Networks. Alpha Science International Limited

    Marchang, J., & Sharma, N. (2007). QoS in MAC layer of MANET. In National Conference on Trends in Advanced Computing NCTAC 2007. Narosa publishing house, New Delhi

    Marchang, J., & Sarma, N. (2007). National Conference on Trends in Advanced Computing NCTAC 2007. In QoS in MAC layer of MANET. Narosa publishing house, New Delhi, India

    Books

    Marchang, J. (2017). Optimising Application Performance in Ad Hoc Networks. Germany: Scholars' Press. https://www.scholars-press.com/catalog/details//store/gb/book/978-620-2-30210-4/optimising-application-performance-in-ad-hoc-networks

  • Other activities

    • Course Leader of Cybersecurity
    • Organizing Open Days
    • Supervising UG, PG and PhD
    • Writing Research Proposals
    • REF reading Team Member
    • Support the Nuffield Foundation Placement
    • Lead projects under SIP, Teaching Enhancement Grants etc.
    • Invited Talks in Cybersecurity
    • External Examiner
    • Supervising local and International summer research intern
    • Research collaboration with Companies, local Universities and overseas Universities

  • Postgraduate supervision

    Supervise PG and PhD students in the field of IoT security, Blockchain Technology for IoT and Ad Hoc networks, secure DHCP designs for Dynamic Wireless Networks. 

Share this page

Cancel event

Are you sure you want to cancel your place on Saturday 12 November?

Close